San Francisco Tapped for Hackaday Unconference on March 18th
We want you to make the next Hackaday live event great. This is an Unconference in San Francisco on Saturday, March 18th and it depends completely on you. Get signed up now!
You’re in Control of the Hackaday Unconference
An unconference is a live event where you decide the topic, guide the discussion, and generally make it an epic Saturday. We have a handful of speakers lined up to help get things started. But we also want you to be ready to give a talk. Everyone that shows up should be prepared to stand up and deliver eight minutes on …read more
What Does a Hacker Do With A Photocopier?
The year is 2016. Driving home from a day’s work in the engineering office, I am greeted with a sight familiar to any suburban dwelling Australian — hard rubbish. It’s a time when local councils arrange a pickup service for anything large you don’t want anymore — think sofas, old computers, televisions, and the like. It’s a great way to make any residential area temporarily look like a garbage dump, but there are often diamonds in the rough. That day, I found mine: the Ricoh Aficio 2027 photocopier.
It had spent its days in a local primary school, and had …read more
SHAttered — SHA-1 is broken in
A team from Google and CWI Amsterdam just announced it: they produced the first SHA-1 hash collision. The attack required over 9,223,372,036,854,775,808 SHA-1 computations, the equivalent processing power as 6,500 years of single-CPU computations and 110 years of single-GPU computations. While this may seem overwhelming, this is a practical attack if you are, lets say, a state-sponsored attacker. Or if you control a large enough botnet. Or if you are just able to spend some serious money on cloud computing. It’s doable. Make no mistake, this is not a brute-force attack, that would take around 12,000,000 single-GPU years to complete. …read more
Suddenly, Wireless Power Transmission Is Everywhere
Wireless power transfer exists right now, but it’s not as cool as Tesla’s Wardenclyffe tower and it’s not as stupid as an OSHA-unapproved ultrasonic power transfer system. Wireless power transfer today is a Qi charger for your phone. It’s low power – just a few amps — and very short range. This makes sense; after all, we’re dealing with the inverse square law here, and wireless power transfer isn’t very efficient.
Now, suddenly, we can transfer nearly two kilowatts wirelessly to electronic baubles scattered all over a room. It’s a project from Disney Research, it’s coming out of Columbia University, …read more
Tales Of A Cheap Chinese Laser Cutter
The star turn of most hackspaces and other community workshops is usually a laser cutter. An expensive and fiddly device that it makes much more sense to own collectively than to buy yourself.
This isn’t to say that laser cutters are outside the budget of the experimenter though, we’re all familiar with the inexpensive table-top machines from China. Blue and white boxes that can be yours for a few hundred dollars, and hold the promise of a real laser cutter on your table.
Owning one of these machines is not always smooth sailing though, because their construction and choice of …read more